Agent Technology for Network Management. Stuart Wagner Sudha Ramesh
|
|
- Berniece Booth
- 5 years ago
- Views:
Transcription
1 Agent Technology for Network Management Stuart Wagner Sudha Ramesh Keith Landgraf October 10, 2002 An SAIC Company
2 Outline Some mobile agent basics Motivation for their use in network management Specific examples of what mobile agents may be able to do for us Key research issues: major questions and challenges in implementing agent-based network management SSW - 10/10/02 2
3 What is a Mobile Agent (MA)? A Loose, Operational Definition A software object that can be dynamically replicated, dispatched to and retracted from network elements not hard-coded into network-element software Its goals are established by the agent management system; it makes decisions and takes actions autonomously in pursuit of these goals can obtain its own thread of control on host network element The attributes of the agent and the agent management system vary with the application SSW - 10/10/02 3
4 Mobile Agent Illustration Traditional Network Management System Agent Creation and Management System A data base Adaptors A SSW - 10/10/02 4
5 Prior Research: MAs for Network Management Many papers, some dating back >10 years Papers have offered much conjecture on the benefits of MAs for network management, principally: reduction in data traffic related to network management better scalability resulting from a more-distributed network management paradigm The claims are unsubstantiated and remain dubious The REAL value may be in providing carriers with greater flexibility in network-management capabilities filling gaps in conventional management functionality facilitating speedy support of new services and features SSW - 10/10/02 5
6 Our Research Goals Demonstrate MA-based network management functionality in a testbed environment Develop a detailed understanding of what it takes to implement a MA infrastructure Assess the relative value of the mobile-agent approach compared with conventional methods Compare the gain with the pain of an MA-based system Draw conclusions on whether, how and where carriers are likely to use MAs Difficult to do in general terms; use specific network examples and case studies to gain insights SSW - 10/10/02 6
7 Network Example - Metro Ethernet Multi-tenant Building LAN 1 LAN 2 LAN n ISP Point of Presence GbE L2 Switch Web Hoster Access Ring Metro/Regional Network (GbE/10GbE Core) Access Ring Data Storage Facility GW VoIP Gateway SSW - 10/10/02 7
8 Why Focus on Ethernet? The low cost and IP-friendly nature of Ethernet hardware make it attractive to carriers Major Government agencies are planning large-scale Ethernet deployments Pacific Rim countries buying thousands of Ethernet switches for Metro-area applications Domestic carriers have issued requirements for Metro Ethernet networks (both hardware and network management) ISPs increasingly peering with each other at Layer 2 However, managing large-scale Ethernet networks is an unsolved problem and presents many challenges SSW - 10/10/02 8
9 Metro Ethernet Management Challenges Ethernet s roots are in enterprise networks carrier-grade network management capabilities are lacking hardware continues to evolve to meet carriers needs Ethernet switch configuration (e.g., via CLI) is laborintensive, slow and error-prone Ethernet is connectionless carrier cannot directly control traffic routes, similar to conventional IP networks without MPLS Ethernet s reaction to network faults can be unpredictable Ethernet hardware is economical, but inadequate NM capabilities have impeded large-scale carrier deployment SSW - 10/10/02 9
10 Example MA Applications in Metro Ethernet Auto-Discovery Agent Creation and Management System A Notify network management of changes to switch configuration... Discover and report all spanning tree routes... Discover and report all VLAN topologies... SSW - 10/10/02 10
11 Example MA Applications in Metro Ethernet VLAN Configuration Agent Creation and Management System A Configure a VLAN with the following ingress/egress points and QoS parameters... Create a spanning tree for this VLAN with the following route... SSW - 10/10/02 11
12 Example MA Applications in Metro Ethernet Service Validation and SLA Management Agent Creation and Management System A Verify the following configuration settings along the path of VLAN XYZ, and report discrepancies Collect and report jitter and packet-loss statistics on VLAN XYZ SSW - 10/10/02 12
13 Example Platform: Anchor Toolkit/Akenti Lawrence Berkeley Labs POLICY IDENTITY ATTRIBUTES Anchor Server A SSL Anchor Server A Agent Security Manager Akenti Policy Engine Access Validation Interceptor JVM Host 1 LOCAL RESOURCES JVM Host 2 SSW - 10/10/02 13
14 Example Platform: Jini Sun Microsystems Agent Creation and Management System Service Provider Service Object Lookup Service Service Object RMI Service Object Client Managed Network Element SSW - 10/10/02 14
15 Other Agent Systems A Sampling Commercial Aglets from IBM AgentBuilder from IntelliOne Technologies GrassHopper from IKV++ Technologies Academic & Research D Agents from Dartmouth University Mobile Code Toolkit from Carleton University Hive from MIT JATLite from Stanford University JADE from CSELT, Italy FarGo from Isreal Institute of Technology Ajanta from Univ. of Minnesota MAgNET from UCSB SSW - 10/10/02 15
16 Key Questions to Address Will network elements accommodate MAs easily? code loading, Java Virtual Machines (JVMs) How does one maintain control over MA actions? limiting authority and access to network-element resources authentication of MAs How many MAs are needed in a network? should they replicate themselves, or should we use a centralized create, dispatch and retrieve model? How mobile do the MAs have to be? single-hop vs. multi-hop/roaming capability Do MAs need to communicate with one another? How intelligent can/should we make the MAs? SSW - 10/10/02 16
17 Accommodating MAs Direct Support on Switch A Switch Hardware Agent Receptor Access Control JVM Adapter Operating System MIB MIB = Management Information Base SSW - 10/10/02 17
18 Accommodating MAs Use of External Receptor A Access Control JVM Adapter Switch Hardware CLI commands Operating System MIB SSW - 10/10/02 18
19 Security Little work done on security of MA systems Important issues are: Protect Host from an Agent Authenticate an incoming agent Verify security of the information it carries With active agents, agent is probably running before you can authenticate. How do we deal with this? Protect Agent from the Host How can the agent trust the host? No easy solutions for this Protect agents from one another This is very difficult Limit and eventually terminate the agent s power to act on behalf of the network management system SSW - 10/10/02 19
20 Security - continued Most proposals use Java security apparatus Addresses only the rogue agent problem Authenticate the agent Limit its access to protected local resources Does not solve other problems Some (Anchor/Akenti) enhance security provided by Java, principally: Enforce security policies by using interceptors which override Java default mechanisms Use secure encrypted communication between agent servers SSW - 10/10/02 20
21 Number, Mobility and Intelligence of MAs Example Task: Discover the topology of VLAN XYZ Two extreme cases: 1. a single MA hops around the network looking for XYZ 2. separate MAs are dispatched to each machine to look for XYZ; information sent to centralized management system Case (1) requires a more-sophisticated agent that makes mobility decisions and carries its own data Case (2) requires only single-hop mobility and minimal agent intelligence agents act as relatively simple probes while a highly shared management system does the processing Jini-like model; minimizes demand on switch CPU SSW - 10/10/02 21
22 Inter-Agent Communication Three Options Agent Creation and Management System A A 1. Agents communicate directly with each other 2. Agents communicate indirectly, through mail boxes or a proxy server 3. Agents communicate only with management system SSW - 10/10/02 22
23 Observations One can envision many feasible combinations of MA attributes the best combination may depend on the network management task to be performed Developing appropriate metrics may be one of the biggest challenges how do we compare the relative merits of different MA implementations? how do we know if the MA approach is better than conventional network management techniques? can we develop metrics that accurately reflect what really matters to the network operator (e.g., complexity, cost)? SSW - 10/10/02 23
Hands-On Metro Ethernet Carrier Class Networks
Hands-On Carrier Class Networks Course Description Carriers have offered connectivity services based on traditional TDM, Frame Relay and ATM for many years. However customers now use Ethernet as the interface
More informationMulti-Dimensional Service Aware Management for End-to-End Carrier Ethernet Services By Peter Chahal
Multi-Dimensional Service Aware Management for End-to-End Carrier Ethernet Services By Peter Chahal We all know Ethernet based on its long history as the LAN connectivity technology of choice. Recently,
More informationNOAA TICAP. Robert Sears NOAA/OCIO/SDD/N-Wave
NOAA TICAP Robert Sears NOAA/OCIO/SDD/N-Wave N-Wave Program N-Wave is a program of Federal and contract staff that manage the NOAA Enterprise Network known as N-Wave, and also supports/aligns and executes
More informationPerformance Assurance Solution Components
Solution brief Performance Assurance Solution Components Network Performance Platforms, Elements, Modules & Agents Accedian is the Performance Assurance Solution specialist, with a complete range of components
More informationOptimizing Ethernet Access Network for Internet Protocol Multi-Service Architecture
1 Optimizing Ethernet Access Network for Internet Protocol Multi-Service Architecture Author: Mikael Forsten TeliaSonera Sonera Carrier Networks Supervisor: Docent Timo O. Korhonen Instructor: M.Sc Jari
More informationChapter 10: Review and Preparation for Troubleshooting Complex Enterprise Networks
0: Review and Preparation for Troubleshooting Complex Enterprise Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks Chapter TSHOOT 1v6 0 1 0 Objectives Review key maintenance and troubleshooting
More informationHands-On VPLS: Virtual Private LAN Service
Hands-On Course Description Carriers have offered connectivity services based on traditional TDM, Frame Relay and ATM for many years. However, the cost of operating separate networks to provide each of
More informationConfiguring Cisco IOS IP SLAs Operations
CHAPTER 39 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service
More informationManaging and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals:
Managing and Securing Computer Networks Guy Leduc Chapter 2: Software-Defined Networks (SDN) Mainly based on: Computer Networks and Internets, 6 th Edition Douglas E. Comer Pearson Education, 2015 (Chapter
More informationIP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
More informationCisco EXAM Designing for Cisco Internetwork Solutions. Buy Full Product.
Cisco EXAM - 640-864 Designing for Cisco Internetwork Solutions Buy Full Product http://www.examskey.com/640-864.html Examskey Cisco 640-864 exam demo product is here for you to test the quality of the
More informationA PERFORMANCE ANALYSIS FRAMEWORK FOR MOBILE-AGENT SYSTEMS
A PERFORMANCE ANALYSIS FRAMEWORK FOR MOBILE-AGENT SYSTEMS Marios D. Dikaiakos Department of Computer Science University of Cyprus George Samaras Speaker: Marios D. Dikaiakos mdd@ucy.ac.cy http://www.cs.ucy.ac.cy/mdd
More informationCCNA Routing and Switching (NI )
CCNA Routing and Switching (NI400+401) 150 Hours ` Outline The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment that is
More informationWAN and Cloud Link Analytics for Enterprises
Solution brief WAN and Cloud Link Analytics for Enterprises Enterprises rely heavily on cloud and WAN links, but there is little visibility into performance issues for these connections. New and better
More informationCisco Certified Network Associate ( )
Cisco Certified Network Associate (200-125) Exam Description: The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment that
More informationNext Generation Networks MultiService Network Design. Dr. Ben Tang
Next Generation Networks MultiService Network Design Dr. Ben Tang April 23, 2008 Operators face difficult network planning and design questions Can your current planning methods handle the complexity of
More informationConverged Communication Networks
Converged Communication Networks Dr. Associate Professor Department of Electrical Engineering Indian Institute of Technology Bombay Powai, Mumbai - 400076 girishs@ee.iitb.ac.in Outline Convergence in core
More informationTutorial. Title: Implementing Agent Applications in Java: Using Mobile and Intelligent Agents.
Tutorial Title: Implementing Agent Applications in Java: Using Mobile and Intelligent Agents. Presenter(s): Dr Omer F. Rana Department of Computer Science, University of Wales, Cardiff, PO Box 916, Cardiff
More informationCCNA. Murlisona App. Hiralal Lane, Ravivar Karanja, Near Pethe High-School, ,
CCNA Cisco Certified Network Associate (200-125) Exam DescrIPtion: The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment
More informationMetro Ethernet Design and Engineering for CO
Hands-On Metro Ethernet Design and Engineering for CO Designing Carrier Networks that Deliver Metro Ethernet Services Course Description Carriers have offered connectivity services based on traditional
More informationYear, pier University Nikos Migas PhD student 2 Supervisors: School of Computing, Na MARIAN
MARIAN Mobile Agents for Routing In Ad-hoc Networks Nikos Migas PhD student 2 nd Year, School of Computing, Napier University n.migas@napier.ac.uk Supervisors: W.Buchanan, K.McArtney Introduction MARIAN
More informationSWITCH Implementing Cisco IP Switched Networks
Hands-On SWITCH Implementing Cisco IP Switched Networks CCNP Course 2 Course Description Revised CCNP Curriculum and Exams Cisco has redesigned the CCNP courses and exams to reflect the evolving job tasks
More informationConnectivity 101 for Remote Monitoring Systems
Connectivity 101 for Remote Monitoring Systems Paul Wacker Moxa, Inc. Manager - Edge Connectivity Ariana Drivdahl Moxa, Inc. Product Marketing Manager Pain Points of Remote Monitoring Pressure to enhance
More informationImplementing Cisco IP Routing (ROUTE)
Implementing Cisco IP Routing (ROUTE) COURSE OVERVIEW: Implementing Cisco IP Routing (ROUTE) v2.0 is an instructor-led five-day training course developed to help students prepare for Cisco CCNP certification.
More informationQuestion No : 1 Which three options are basic design principles of the Cisco Nexus 7000 Series for data center virtualization? (Choose three.
Volume: 162 Questions Question No : 1 Which three options are basic design principles of the Cisco Nexus 7000 Series for data center virtualization? (Choose three.) A. easy management B. infrastructure
More informationMPLS VPN--Inter-AS Option AB
The feature combines the best functionality of an Inter-AS Option (10) A and Inter-AS Option (10) B network to allow a Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) service provider
More informationMetro Ethernet Forum OAM. Matt Squire Hatteras Networks
Metro Ethernet Forum OAM Matt Squire Hatteras Networks 1 The Problem Significant inhibitor of large scale Ethernet deployments is lack of OAM capabilities Compared with SONET, ATM, etc. These other technologies
More informationPrime Performance Manager Overview
1 CHAPTER The following topics provide an overview to Cisco Prime Performance Manager user operations: Prime Performance Manager Features and Functions, page 1-1 Prime Performance Manager Reports, page
More informationNovell Access Manager 3.1
Technical White Paper IDENTITY AND SECURITY www.novell.com Novell Access Manager 3.1 Access Control, Policy Management and Compliance Assurance Novell Access Manager 3.1 Table of Contents: 2..... Complete
More informationIP & DCN Planning for Microwave Networks
IP & DCN Planning for Microwave Networks 2016 IP & DCN Planning for Microwave Networks To equip trainees with in-depth understandings and practical knowledge of IP / MPLS & DCN Planning and its Implementation
More informationCisco CCNP ROUTE: Implementing Cisco IP Routing (ROUTE) 2.0. Upcoming Dates. Course Description. Course Outline
Cisco CCNP ROUTE: Implementing Cisco IP Routing (ROUTE) 2.0 Implementing Cisco IP Routing (ROUTE) v2.0 is an instructor-led five day training course developed to help students prepare for Cisco CCNP certification.
More informationCato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief
Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based
More informationPowering Transformation With Cisco
Shape Your Business For the Future: Powering Transformation With Cisco Cisco Prime for Service Provider: Optimize Your Agility, Lower Your Costs Kenneth CHAN Consulting Systems Engineer Global Service
More informationConfiguring Cisco IOS IP SLAs Operations
CHAPTER 50 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service
More informationChapter 18 Distributed Systems and Web Services
Chapter 18 Distributed Systems and Web Services Outline 18.1 Introduction 18.2 Distributed File Systems 18.2.1 Distributed File System Concepts 18.2.2 Network File System (NFS) 18.2.3 Andrew File System
More informationSmart Fiber is Smart Business. Connectivity Benefits to Property Managers and Tenants
Smart Fiber is Smart Business Connectivity Benefits to Property Managers and Tenants Attract More Tenants Smart Fiber is smart business for property managers and commercial building owners. When you offer
More informationConfiguring Cisco IOS IP SLA Operations
CHAPTER 58 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLA) on the switch. Cisco IP SLA is a part of Cisco IOS software that allows Cisco customers to analyze IP service levels
More informationTruffle Broadband Bonding Network Appliance
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
More informationTaking MPLS to the Edge. Irit Gillath
Taking MPLS to the Edge Irit Gillath Agenda Market status MPLS, VPLS, HVPLS and other nasty words Case study: Silver server Recap Moving Ethernet from the enterprise to the carrier Ethernet was used originally
More informationADTRAN ADVANCED OPERATIONAL ENVIRONMENT (AOE)
ADTRAN Advanced Operational Environment ADTRAN is focused on meeting the increasing demand for service level management and is evolving the ADTRAN suite of management offerings to an intelligent service
More informationGlobal IP Network System Large-Scale, Guaranteed, Carrier-Grade
Global Network System Large-Scale, Guaranteed, Carrier-Grade 192 Global Network System Large-Scale, Guaranteed, Carrier-Grade Takanori Miyamoto Shiro Tanabe Osamu Takada Shinobu Gohara OVERVIEW: traffic
More informationA Deployable Framework for Providing Better Than Best-Effort Quality of Service for Traffic Flows
A Deployable Framework for Providing Better Than Best-Effort Quality of Service for Traffic Flows Proposal Presentation Raheem A. Beyah July 10, 2002 Communications Systems Center Presentation Outline
More informationSoftware Architecture Patterns
Software Architecture Patterns *based on a tutorial of Michael Stal Harald Gall University of Zurich http://seal.ifi.uzh.ch/ase www.infosys.tuwien.ac.at Overview Goal Basic architectural understanding
More informationCS 640: Introduction to Computer Networks. Intra-domain routing. Inter-domain Routing: Hierarchy. Aditya Akella
CS 640: Introduction to Computer Networks Aditya Akella Lecture 11 - Inter-Domain Routing - BGP (Border Gateway Protocol) Intra-domain routing The Story So Far Routing protocols generate the forwarding
More informationAppropriate Layer-2 Interconnection Between IXPs
Appropriate Layer-2 Interconnection Between IXPs Keith Mitchell NANOG31, San Francisco 24/25 th May 2004 Layer-2 Interconnect Typical scenarios faced by IXP operators today: ISPs conserving router ports
More informationInternet2 Meeting September 2005
End User Agents: extending the "intelligence" to the edge in Distributed Systems Internet2 Meeting California Institute of Technology 1 OUTLINE (Monitoring Agents using a Large, Integrated s Architecture)
More informationMPLS VPN Inter-AS Option AB
First Published: December 17, 2007 Last Updated: September 21, 2011 The feature combines the best functionality of an Inter-AS Option (10) A and Inter-AS Option (10) B network to allow a Multiprotocol
More informationSNMP: Simplified. White Paper by F5
The Simple Network Management Protocol defines a method for managing devices that connect to IP networks. The "simple" in SNMP refers to the requirements for a managed device, not the protocol. This white
More informationService-Oriented Programming
Service-Oriented Programming by Guy Bieber, Lead Architect, ISD C4I, Motorola ABSTRACT - The Service-Oriented Programming (SOP) model is the most exciting revolution in programming since Object Oriented
More informationImportance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks
Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks Richard Harada Product Manager RuggedCom Inc. Introduction Reliable and fault tolerant high speed communication
More informationTropos Technology Overview
Tropos Technology Overview May 2005 Enzo Zerbi Business Development Manager enzo.zerbi@programatica.it Agenda Introduction Tropos MetroMesh Architecture Tropos MetroMesh OS Predictive Wireless Routing
More informationPREREQUISITES TARGET AUDIENCE. Length Days: 5
Cisco Implementing Cisco IP Routing v2.0 (ROUTE) ROUTE v2.0 includes major updates and follows an updated blueprint. However, note that this course does not cover all items listed on the blueprint. Some
More informationSDN, SD-WAN, NFV, VNF I m confused!
SDN, SD-WAN, NFV, VNF I m confused! Presenter: Tim Sullivan CEO, Coevolve @timsullo April 2017 Introduction to Coevolve Coevolve was established in 2014 to help drive enterprise adoption of next-generation
More informationRouting Basics. Campus Network Design & Operations Workshop
Routing Basics Campus Network Design & Operations Workshop These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationCptS 464/564 Lecture 18
CptS 464/564 Lecture 18 2nd November 2004 Checkpoint What have we covered so far? Paradigms and Models: frameworks for the discussion of DS What is the plan ahead? Next: examples of distributed systems
More informationChapter 5 INTRODUCTION TO MOBILE AGENT
Chapter 5 INTRODUCTION TO MOBILE AGENT 135 Chapter 5 Introductions to Mobile Agent 5.1 Mobile agents What is an agent? In fact a software program is containing an intelligence to help users and take action
More informationNetwork Management. Network Management: Goals, Organization and Functions
Network Management Network Management: Goals, Organization and Functions Telecomm/Data Network A telecommunication/data network is composed from many network elements (switching systems, terminals, circuits
More informationScott Jordan University of California, Irvine. Intersections between Information Technology Research and Public Policy
Scott Jordan University of California, Irvine Intersections between Information Technology Research and Public Policy Researcher view Research idea Research Deployment University view Research Patent Prototype
More informationDatasheet: OptiView XG Network Analysis Tablet - Version 11 Software Release and OptiView Performance Test Remote
Unpublished Datasheet: OptiView XG Network Analysis Tablet - Version 11 Software Release and OptiView Performance Test A dedicated tablet for automated network and application analysis, OptiView XG is
More informationCato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN
Cato Cloud Software-defined and Cloud-based Secure Enterprise Network Solution Brief NETWORK + SECURITY IS SIMPLE AGAIN Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The
More informationData Center Interconnect Solution Overview
CHAPTER 2 The term DCI (Data Center Interconnect) is relevant in all scenarios where different levels of connectivity are required between two or more data center locations in order to provide flexibility
More informationWireless Mesh Networks
Distributed Systems 600.437 Wireless Mesh Networks Department of Computer Science The Johns Hopkins University 1 Wireless Mesh Networks Lecture 10 Further reading: www.dsn.jhu.edu/publications/ 2 The Wireless
More informationShaken 101: Mitigating Illegal Robocalling and Caller ID Scams Webinar
Shaken 101: Mitigating Illegal Robocalling and Caller ID Scams Webinar Panelists: Dr. Eric Burger Chief Technology Officer FCC Jim McEachern Principal Technologist ATIS Moderator: Brent Struthers STI-GA
More informationTransforming the Cisco WAN with Network Intelligence
Transforming the Cisco WAN with Network Intelligence Introduction Branch office networks and the enterprise WAN are in a state of dramatic transformation, driven by three key trends. Enterprises are using
More informationVirtual Private Networks (VPNs)
CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure
More informationWHITE PAPER. Session Border Controllers: Helping keep enterprise networks safe TABLE OF CONTENTS. Starting Points
WHITE PAPER Session Border Controllers: Helping keep enterprise networks safe TABLE OF CONTENTS Starting Points...1 The Four Essentials...2 The Business Case for SIP Trunks...3 To benefit from the latest
More informationETNA Inter Domain Transport Hayim Porat Ethos Networks 05/09
ETNA Inter Domain Transport Hayim Porat Ethos Networks 05/09 ETNA 215462 STREP FP7-ICT-2007 The Network of the Future 1 Motivation Inter carrier (inter Domain) service provisioning automation is gaining
More informationFrom Zero Touch Provisioning to Secure Business Intent
From Zero Touch Provisioning to Secure Business Intent Flexible Orchestration with Silver Peak s EdgeConnect SD-WAN Solution From Zero Touch Provisioning to Secure Business Intent Flexible Orchestration
More informationEnterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV.
2 CHAPTER Cisco's Disaster Recovery as a Service (DRaaS) architecture supports virtual data centers that consist of a collection of geographically-dispersed data center locations. Since data centers are
More informationOutline Computer Networking. Inter and Intra-Domain Routing. Internet s Area Hierarchy Routing hierarchy. Internet structure
Outline 15-441 15-441 Computer Networking 15-641 Lecture 10: Inter-Domain outing Border Gateway Protocol -BGP Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 outing hierarchy Internet structure
More informationEthane: taking control of the enterprise
Ethane: taking control of the enterprise Martin Casado et al Giang Nguyen Motivation Enterprise networks are large, and complex, and management is distributed. Requires substantial manual configuration.
More informationCentral Office Testing of Network Services
Central Office Testing of Network Services May, 2009 Application Note Ethernet is rapidly becoming the predominant method for deploying new commercial services and for expanding backhaul capacity. Carriers
More informationApplication-Aware Network INTRODUCTION: IT CHANGES EVOLVE THE NETWORK. By Zeus Kerravala -
WHITE PAPER Application-Aware Network AN APPLICATION-AWARE NETWORK IS KEY TO MAXIMIZING PRODUCTIVITY By Zeus Kerravala - INTRODUCTION: IT CHANGES EVOLVE THE NETWORK Enterprise IT has seen several major
More informationThe Future of Broadband Wireless Today.
The Future of Broadband Wireless Today. Azalea Networks... A Wireless Mesh Network Solutions Provider Delivering Network Intelligence through Wireless Routing Technology that Sets New Standards in Price
More informationJIMS Extensions for Resource Monitoring and Management of Solaris 10
1 ICCS 2006 (GSRM'06) JIMS Extensions for Resource Monitoring and Management of Solaris 10 JIMS Extensions for Resource Monitoring and Management of Solaris 10 Marcin Jarząb, Damian Wieczorek, Kazimierz
More informationCisco Plug and Play Feature Guide Cisco Services. Cisco Plug and Play Feature Guide Cisco and/or its affiliates.
Cisco Services TABLE OF CONTENTS Configuring Cisco Plug and Play... 14 Contents Introduction... 3 Cisco Plug and Play Components... 3 Plug-n-Play Agent... 3 Key Benefits... 4 Plug and Play Server... 4
More informationCitrix SD-WAN for Optimal Office 365 Connectivity and Performance
Solution Brief Citrix SD-WAN for Optimal Office 365 Connectivity and Performance Evolving Needs for WAN Network Architecture Enterprise networks have historically been architected to provide users access
More informationCisco ISR G2 Management Overview
Cisco ISR G2 Management Overview Introduction The new Cisco Integrated Services Routers Generation 2 (ISR G2) Family of routers delivers the borderless network that can transform the branch office and
More informationWAN Optimization. Overview KNOW YOUR NETWORK
KNOW YOUR NETWORK DATA SHEET WAN Optimization Acceleration and Compression Overview Enterprise productivity requires that all employees have a high-quality user experience when accessing business applications,
More informationWhat s New in Release 9.2 Martin Adamčík
CA SPECTRUM Infrastructure Manager What s New in Release 9.2 Martin Adamčík Agenda New IP Routing Management New Report Management Capabilities Network Configuration Management Enhancements in r9.2 Other
More informationCISCO EXAM QUESTIONS & ANSWERS
CISCO 648-385 EXAM QUESTIONS & ANSWERS Number: 648-385 Passing Score: 800 Time Limit: 120 min File Version: 41.0 http://www.gratisexam.com/ CISCO 648-385 EXAM QUESTIONS & ANSWERS Exam Name: CXFF - Cisco
More informationAdaptive Cluster Computing using JavaSpaces
Adaptive Cluster Computing using JavaSpaces Jyoti Batheja and Manish Parashar The Applied Software Systems Lab. ECE Department, Rutgers University Outline Background Introduction Related Work Summary of
More informationContact Center SIP Migration SYNERGY DRIVES SUCCESS
Contact Center SIP Migration SYNERGY DRIVES SUCCESS @ One Voice A Complete SIP Solution One Voice for Genesys A Complete SIP Solution for Contact Centers CUSTOMER EXPERIENCE PLATFORM A B Work Items Rules
More informationThe Economic Benefits of a Cooperative Control Wireless LAN Architecture
White Paper The Economic Benefits of a Cooperative Control Wireless LAN Architecture Aerohive Networks, Inc. 3150-C Coronado Avenue Santa Clara, California 95054 Phone: 408.988.9918 Toll Free: 1.866.918.9918
More informationCisco Wide Area Bonjour Solution Overview
, page 1 Topology Overview, page 2 About the Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM), page 5 The Cisco Wide Area Bonjour solution is based on a distributed and hierarchical
More informationTEXTBOOK MAPPING CISCO COMPANION GUIDES
TestOut Routing and Switching Pro - English 6.0.x TEXTBOOK MAPPING CISCO COMPANION GUIDES Modified 2018-08-20 Objective Mapping: Cisco 100-105 ICND1 Objective to LabSim Section # Exam Objective TestOut
More informationSonus Networks engaged Miercom to evaluate the call handling
Key findings and conclusions: Lab Testing Summary Report September 2010 Report 100914B Product Category: Session Border Controller Vendor Tested: Sonus SBC 5200 successfully registered 256,000 user authenticated
More informationCOURSE OUTLINE MOC : PLANNING AND ADMINISTERING SHAREPOINT 2016
COURSE OUTLINE MOC 20339-1: PLANNING AND ADMINISTERING SHAREPOINT 2016 Module 1: Introducing SharePoint 2016 This module describes the structure and capabilities of a SharePoint environment, and the major
More informationIntroduction. Keith Barker, CCIE #6783. YouTube - Keith6783.
Understanding, Implementing and troubleshooting BGP 01 Introduction http:// Instructor Introduction Keith Barker, CCIE #6783 CCIE Routing and Switching 2001 CCIE Security 2003 kbarker@ine.com YouTube -
More informationICENI: An Open Grid Service Architecture Implemented with Jini Nathalie Furmento, William Lee, Anthony Mayer, Steven Newhouse, and John Darlington
ICENI: An Open Grid Service Architecture Implemented with Jini Nathalie Furmento, William Lee, Anthony Mayer, Steven Newhouse, and John Darlington ( Presentation by Li Zao, 01-02-2005, Univercité Claude
More informationImportant Lessons From Last Lecture Computer Networking. Outline. Routing Review. Routing hierarchy. Internet structure. External BGP (E-BGP)
Important Lessons From Last Lecture 15-441 Computer Networking Inter-Domain outing BGP (Border Gateway Protocol) Every router needs to be able to forward towards any destination Forwarding table must be
More informationHPE FlexFabric 5940 Switch Series
HPE FlexFabric 5940 Switch Series EVPN Configuration Guide Part number: 5200-2002b Software version: Release 25xx Document version: 6W102-20170830 Copyright 2017 Hewlett Packard Enterprise Development
More information31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers
31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network
More informationManaging Site-to-Site VPNs: The Basics
CHAPTER 23 A virtual private network (VPN) consists of multiple remote peers transmitting private data securely to one another over an unsecured network, such as the Internet. Site-to-site VPNs use tunnels
More informationThe Learning Network of Minnesota Blueprint for Higher Education
The Learning Network of Minnesota Blueprint for Higher Education Introduction From its beginning in 1993 as an effort to provide network connectivity for public post-secondary institutions, the Learning
More informationVXLAN Overview: Cisco Nexus 9000 Series Switches
White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide
More informationInternet Interconnection An Internet Society Public Policy Briefing
Internet Interconnection An Internet Society Public Policy Briefing 30 October 2015 Introduction The Internet comprises thousands of independently owned, managed, and operated networks that connect with
More informationIntroduction. Network Architecture Requirements of Data Centers in the Cloud Computing Era
Massimiliano Sbaraglia Network Engineer Introduction In the cloud computing era, distributed architecture is used to handle operations of mass data, such as the storage, mining, querying, and searching
More informationTREND REPORT. Ethernet, MPLS and SD-WAN: What Decision Makers Really Think
TREND REPORT Ethernet, MPLS and SD-WAN: What Decision Makers Really Think TABLE OF CONTENTS Introduction 3 CH. 1 What IT Pros Think of Ethernet 4 CH. 2 What IT Pros Think of MPLS 8 CH. 3 What IT Pros Think
More informationFeatures. HDX WAN optimization. QoS
May 2013 Citrix CloudBridge Accelerates, controls and optimizes applications to all locations: datacenter, branch offices, public and private clouds and mobile users Citrix CloudBridge provides a unified
More information